Názor k článku Jak je to s bezpečnostní dírou procesorů Intel. Chyby jsou dvě, Meltdown a Spectre od tombomino - Tady mas kompetentni odpoved Linuse na korporatni PR...

  • 4. 1. 2018 23:26

    tombomino

    Tady mas kompetentni odpoved Linuse na korporatni PR kecy (v tomto pripade v podani Intelu)..
    " A *competent* CPU engineer would fix this by making sure speculation doesn't happen across protection domains. Maybe even a L1 I$ that is keyed by CPL.
    I think somebody inside of Intel needs to really take a long hard look at their CPU's, and actually admit that they have issues instead of writing PR blurbs that say that everything works as designed.
    .. and that really means that all these mitigation patches should be written with "not all CPU's are crap" in mind.
    Or is Intel basically saying "we are committed to selling you shit forever and ever, and never fixing anything"?
    Because if that's the case, maybe we should start looking towards the ARM64 people more.
    Please talk to management. Because I really see exactly two possibibilities: Intel never intends to fix anything OR these workarounds should have a way to disable them. Which of the two is it?
    Linus Torvalds